Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417634
A. Moghaddam
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations of computer security policies, or standard security practices. Intrusion detection system identifies possible incidents, logs information and provides report about them. In this article a real time intrusion detection system using SNORT rules and KMP algorithm is implemented in reconfigurable hardware. The parallel structure of this architecture let us to achieve a high real time performance at rate 100Mbps as it is shown by simulation and synthesis results on VIRTEX4.
{"title":"Real time implementation of intrusion detection system with reconfigurable architecture","authors":"A. Moghaddam","doi":"10.1109/ICOS.2012.6417634","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417634","url":null,"abstract":"Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations of computer security policies, or standard security practices. Intrusion detection system identifies possible incidents, logs information and provides report about them. In this article a real time intrusion detection system using SNORT rules and KMP algorithm is implemented in reconfigurable hardware. The parallel structure of this architecture let us to achieve a high real time performance at rate 100Mbps as it is shown by simulation and synthesis results on VIRTEX4.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"1 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417628
A. Asmat, Khairunnisa Abd Jalal, N. Ahmad
The knowledge of aerosol optical properties is important for estimation of radiative balance effect to the Earth's system. Aerosol can have directly effect to the radiation by scattering and absorption process depending on their chemical and physical properties. Uncertainties in estimation of radiative effect are cause by lack of knowledge for aerosol properties. AERONET Sun photometer had been used to measure the AOD, linear regressions to calculate Angstrom exponent and inversion algorithm to retrieve single scattering albedo and refractive index over Kuching, Sarawak from August 2011 until October 2011. The mean values of AOD for August was (0.4014±0.3126), for September was reported as (0.3158±0.1877) and (0.1689±0.0813) for October 2011. The minimum value for Angstrom is 0.3233 and the maximum value is 1.9325 which indicates a presence of fine mode aerosol and coarse mode aerosol. The averaged SSA for August at 440nm was 0.8997 and 0.7604 for 1020nm meanwhile for September SSA value was 0.9586 for 440nm and 0.9239 for 1020nm. It shows an increasing of urban pollution and biomass burning aerosol. The refractive index for real part and imaginary part measurement suggest that absorbing aerosols are more dominant in Kuching, Sarawak.
{"title":"Variability of optical properties for atmospheric aerosol in Kuching city using AERONET Sunphotometer","authors":"A. Asmat, Khairunnisa Abd Jalal, N. Ahmad","doi":"10.1109/ICOS.2012.6417628","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417628","url":null,"abstract":"The knowledge of aerosol optical properties is important for estimation of radiative balance effect to the Earth's system. Aerosol can have directly effect to the radiation by scattering and absorption process depending on their chemical and physical properties. Uncertainties in estimation of radiative effect are cause by lack of knowledge for aerosol properties. AERONET Sun photometer had been used to measure the AOD, linear regressions to calculate Angstrom exponent and inversion algorithm to retrieve single scattering albedo and refractive index over Kuching, Sarawak from August 2011 until October 2011. The mean values of AOD for August was (0.4014±0.3126), for September was reported as (0.3158±0.1877) and (0.1689±0.0813) for October 2011. The minimum value for Angstrom is 0.3233 and the maximum value is 1.9325 which indicates a presence of fine mode aerosol and coarse mode aerosol. The averaged SSA for August at 440nm was 0.8997 and 0.7604 for 1020nm meanwhile for September SSA value was 0.9586 for 440nm and 0.9239 for 1020nm. It shows an increasing of urban pollution and biomass burning aerosol. The refractive index for real part and imaginary part measurement suggest that absorbing aerosols are more dominant in Kuching, Sarawak.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417650
M. A. Abu, Z. Kornain, I. M. Iqbal, M. H. Rosli
This paper represents the development of a car braking system based on artificial neural network for use during parking. This project involves replacing the usual car reverse warning system with a system that will react automatically based on the distance between the car and a given obstacle by gradually increasing the braking pressure until such a point that is deemed the closest safe distance to the obstacle, in which the braking pressure will then be increased to max and the car will halt. To realize this application, this project will make use of LabView simulation software to create the artificial neural network engine and present the simulation results.
{"title":"Automated car braking system: Using neural network system via Labview environment","authors":"M. A. Abu, Z. Kornain, I. M. Iqbal, M. H. Rosli","doi":"10.1109/ICOS.2012.6417650","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417650","url":null,"abstract":"This paper represents the development of a car braking system based on artificial neural network for use during parking. This project involves replacing the usual car reverse warning system with a system that will react automatically based on the distance between the car and a given obstacle by gradually increasing the braking pressure until such a point that is deemed the closest safe distance to the obstacle, in which the braking pressure will then be increased to max and the car will halt. To realize this application, this project will make use of LabView simulation software to create the artificial neural network engine and present the simulation results.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417620
C. Otero, I. Kostanic, A. Peter, A. Ejnioui, L. D. Otero
The need for advanced tools that provide efficient design and planning of on-demand deployment of wireless sensor networks (WSN) is critical for meeting our nation's demand for increased intelligence, reconnaissance, and surveillance in numerous safety-critical applications. For practical applications, WSN deployments can be time-consuming and error-prone, since they have the utmost challenge of guaranteeing connectivity and proper area coverage upon deployment. This creates an unmet demand for decision-support systems that help manage this complex process. This paper presents research-in-progress to develop an advanced decision-support system for predicting the optimal deployment of wireless sensor nodes within an area of interest. The proposed research will have significant impact on the future application of WSN technology, specifically in the emergency response, environmental quality, national security, and engineering education domains.
{"title":"Intelligent system for predicting wireless sensor network performance in on-demand deployments","authors":"C. Otero, I. Kostanic, A. Peter, A. Ejnioui, L. D. Otero","doi":"10.1109/ICOS.2012.6417620","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417620","url":null,"abstract":"The need for advanced tools that provide efficient design and planning of on-demand deployment of wireless sensor networks (WSN) is critical for meeting our nation's demand for increased intelligence, reconnaissance, and surveillance in numerous safety-critical applications. For practical applications, WSN deployments can be time-consuming and error-prone, since they have the utmost challenge of guaranteeing connectivity and proper area coverage upon deployment. This creates an unmet demand for decision-support systems that help manage this complex process. This paper presents research-in-progress to develop an advanced decision-support system for predicting the optimal deployment of wireless sensor nodes within an area of interest. The proposed research will have significant impact on the future application of WSN technology, specifically in the emergency response, environmental quality, national security, and engineering education domains.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417642
A. Sedaghati, A. B. Dastjerdi
The popularity of mobile devices has made them lovely targets for malicious code developers; and these attacks to mobile devices, are growing day by day. In comparison to fixed environments, mobility has its special features and limitations, like frequently disconnections and user's movement, that affect security mechanisms. They delay user's access to his data; and this delay can lead to change in access conditions. Therefore, Access control mechanisms must cover these changes dynamically. In this paper we use both mobile agents and role based access control in form of capability lists, to introduce a dynamic access control mechanism.
{"title":"Access control in mobile databases using mobile agents","authors":"A. Sedaghati, A. B. Dastjerdi","doi":"10.1109/ICOS.2012.6417642","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417642","url":null,"abstract":"The popularity of mobile devices has made them lovely targets for malicious code developers; and these attacks to mobile devices, are growing day by day. In comparison to fixed environments, mobility has its special features and limitations, like frequently disconnections and user's movement, that affect security mechanisms. They delay user's access to his data; and this delay can lead to change in access conditions. Therefore, Access control mechanisms must cover these changes dynamically. In this paper we use both mobile agents and role based access control in form of capability lists, to introduce a dynamic access control mechanism.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120892305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417655
Y. Yusof, M. F. A. Hassan, N. Nadzri
Real-time systems is one of the topic introduced as part of courses taught in most undergraduate engineering and computer science. From industrial perspective, embedded realtime systems discipline deemed to be important and are widely used in industrial applications such as avionics, aerospace, robotics, automobile, and industrial control etc. This paper shares the hands-on laboratory embedded real-time software utilizing Simulation Program with Integrated Circuit Emphasis (SPICE) having Virtual System Modeling (VSM) capabilities together with low cost microcontroller based system. Using these tools students will not only learn real-time and multitask programming but also exposed to the nitty-gritty and challenges of Hardware Software (HW/SW) development which will contribute towards a better understanding and appreciation of embedded real-time systems.
{"title":"Hands-on undergraduate real-time systems and Hardware-Software development","authors":"Y. Yusof, M. F. A. Hassan, N. Nadzri","doi":"10.1109/ICOS.2012.6417655","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417655","url":null,"abstract":"Real-time systems is one of the topic introduced as part of courses taught in most undergraduate engineering and computer science. From industrial perspective, embedded realtime systems discipline deemed to be important and are widely used in industrial applications such as avionics, aerospace, robotics, automobile, and industrial control etc. This paper shares the hands-on laboratory embedded real-time software utilizing Simulation Program with Integrated Circuit Emphasis (SPICE) having Virtual System Modeling (VSM) capabilities together with low cost microcontroller based system. Using these tools students will not only learn real-time and multitask programming but also exposed to the nitty-gritty and challenges of Hardware Software (HW/SW) development which will contribute towards a better understanding and appreciation of embedded real-time systems.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417627
Khondaker M. Rahman, T. Alam, M. Chowdhury
Natural Disasters have threatened mankind since history started. Due to geographic position and climate change, Bangladesh is one of most vulnerable countries to natural disasters. The country also lacks effective disaster preparedness system to confront natural disasters. Timely disaster warning and evacuation guideline can save lives of the people. In addition, a tourist or a blind people may face difficulties in finding safe area or shelter place prior to the occurrence of natural disasters. For this reason, we have proposed a location based early disaster warning and evacuation system for both normal and blind people using OpenStreetMap (OSM). The system is implemented on android mobile phone because of the burgeoning growth of smart phones in Bangladesh. So, our system comprises a third-party server named Disaster Management Server (DMS), android device with our application installed on it and user. The local weather office updates the disaster (tsunami, cyclone or flood) data on DMS. Device user registers on Android Cloud to Device Messaging (C2DM) server to get automatic notification of upcoming disaster otherwise user gets manual notification. The user communicates with DMS to have updated data sending the current position obtained by GPS or network provider. The probable disaster affected area is determined by ray casting algorithm. When our application recognizes the user in probable disaster zone then application will disseminate visual and audio disaster warning and evacuation guideline including shortest path of shelter or safe zone on the map of the application. Evacuation progress is also tracked using DMS and national identification of user. The experimental result demonstrates the effectiveness of our system.
自古以来,自然灾害就一直威胁着人类。由于地理位置和气候变化,孟加拉国是最容易遭受自然灾害的国家之一。国家也缺乏有效的备灾系统来应对自然灾害。及时的灾害预警和疏散指引可以挽救人们的生命。此外,在自然灾害发生之前,游客或盲人可能面临寻找安全区域或避难所的困难。为此,我们利用OpenStreetMap (OSM)为正常人和盲人提出了一个基于位置的早期灾害预警和疏散系统。由于孟加拉国智能手机的迅速增长,该系统在android手机上实现。因此,我们的系统包括一个名为灾难管理服务器(DMS)的第三方服务器,安装了我们的应用程序的android设备和用户。当地气象局更新DMS上的灾害(海啸、气旋或洪水)数据。设备用户在Android Cloud to Device Messaging (C2DM)服务器上注册,以获得即将到来的灾难的自动通知,否则用户将获得手动通知。用户与DMS通信以获得更新的数据,发送由GPS或网络提供商获得的当前位置。通过光线投射算法确定可能的受灾区域。当我们的应用程序识别到可能的灾区的用户,然后应用程序将传播视觉和音频的灾难警报和疏散指南,包括在应用程序的地图上的庇护所或安全区的最短路径。还使用DMS和用户的国家身份来跟踪撤离进度。实验结果证明了系统的有效性。
{"title":"Location based early disaster warning and evacuation system on mobile phones using OpenStreetMap","authors":"Khondaker M. Rahman, T. Alam, M. Chowdhury","doi":"10.1109/ICOS.2012.6417627","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417627","url":null,"abstract":"Natural Disasters have threatened mankind since history started. Due to geographic position and climate change, Bangladesh is one of most vulnerable countries to natural disasters. The country also lacks effective disaster preparedness system to confront natural disasters. Timely disaster warning and evacuation guideline can save lives of the people. In addition, a tourist or a blind people may face difficulties in finding safe area or shelter place prior to the occurrence of natural disasters. For this reason, we have proposed a location based early disaster warning and evacuation system for both normal and blind people using OpenStreetMap (OSM). The system is implemented on android mobile phone because of the burgeoning growth of smart phones in Bangladesh. So, our system comprises a third-party server named Disaster Management Server (DMS), android device with our application installed on it and user. The local weather office updates the disaster (tsunami, cyclone or flood) data on DMS. Device user registers on Android Cloud to Device Messaging (C2DM) server to get automatic notification of upcoming disaster otherwise user gets manual notification. The user communicates with DMS to have updated data sending the current position obtained by GPS or network provider. The probable disaster affected area is determined by ray casting algorithm. When our application recognizes the user in probable disaster zone then application will disseminate visual and audio disaster warning and evacuation guideline including shortest path of shelter or safe zone on the map of the application. Evacuation progress is also tracked using DMS and national identification of user. The experimental result demonstrates the effectiveness of our system.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417631
Siti Robaya Jantan, S. A. Aljunid
The effectiveness of educational games design has been the issue of many researches in recent years to support Computer Science (CS) novices, especially in the context of learning introductory programming courses. This issue has been highlighted due to the difficulties faced by students in developing algorithms related to programming concept, program construction as well as understanding and applying programming control structures. To overcome the identified difficulties and improve teaching and learning of programming, a number of research works have proposed educational games to motivate and engage their novices. However, to our knowledge, past research had applied general scaffolding characteristics in their games, but none has adapted these characteristics in the context of educational games design. As a result, three scaffolded educational games design characteristics are adapted to be embedded into our games. As proof of concept, a number of puzzle-based educational games which focus on decision-making structures are redesigned and redeveloped for teaching and learning programming. To validate the design, an experiment is conducted to 30 CS novices, who are randomly assigned into control and experimental groups. The results showed the educational games design-scaffolding characteristics are perceivably effective in assisting CS novices in learning programming. Therefore, the findings suggest these scaffolding characteristics have successfully been embedded as an effective educational games design technique.
{"title":"An experimental evaluation of scaffolded educational games design for programming","authors":"Siti Robaya Jantan, S. A. Aljunid","doi":"10.1109/ICOS.2012.6417631","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417631","url":null,"abstract":"The effectiveness of educational games design has been the issue of many researches in recent years to support Computer Science (CS) novices, especially in the context of learning introductory programming courses. This issue has been highlighted due to the difficulties faced by students in developing algorithms related to programming concept, program construction as well as understanding and applying programming control structures. To overcome the identified difficulties and improve teaching and learning of programming, a number of research works have proposed educational games to motivate and engage their novices. However, to our knowledge, past research had applied general scaffolding characteristics in their games, but none has adapted these characteristics in the context of educational games design. As a result, three scaffolded educational games design characteristics are adapted to be embedded into our games. As proof of concept, a number of puzzle-based educational games which focus on decision-making structures are redesigned and redeveloped for teaching and learning programming. To validate the design, an experiment is conducted to 30 CS novices, who are randomly assigned into control and experimental groups. The results showed the educational games design-scaffolding characteristics are perceivably effective in assisting CS novices in learning programming. Therefore, the findings suggest these scaffolding characteristics have successfully been embedded as an effective educational games design technique.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417646
A. Ejnioui, C. Otero, A. Qureshi
Although many approaches have been proposed to prioritize requirements in software projects, almost none has been widely adopted. This is mostly due to their complexity, time commitment, lack of consistency, or implementation difficulties. This paper proposes a novel approach to do so that is practical, easy to implement and can show a reasonable level of consistency. In addition, it takes in consideration the imprecise nature of requirements and quality attributes by modeling the latter as fuzzy variables. The problem of prioritizing requirements is formulated as a fuzzy multi-attribute decision problem in which the expected value operator is used to rank the alternatives listed in the problem formulation. This approach can be easily extended to include other quality attributes as well as customized to fit the needs of most software projects.
{"title":"Software requirement prioritization using fuzzy multi-attribute decision making","authors":"A. Ejnioui, C. Otero, A. Qureshi","doi":"10.1109/ICOS.2012.6417646","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417646","url":null,"abstract":"Although many approaches have been proposed to prioritize requirements in software projects, almost none has been widely adopted. This is mostly due to their complexity, time commitment, lack of consistency, or implementation difficulties. This paper proposes a novel approach to do so that is practical, easy to implement and can show a reasonable level of consistency. In addition, it takes in consideration the imprecise nature of requirements and quality attributes by modeling the latter as fuzzy variables. The problem of prioritizing requirements is formulated as a fuzzy multi-attribute decision problem in which the expected value operator is used to rank the alternatives listed in the problem formulation. This approach can be easily extended to include other quality attributes as well as customized to fit the needs of most software projects.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/ICOS.2012.6417635
N. Temglit, M. A. Nacer
As more web services can be used over the Internet, the need to find and combine dynamically efficient services to fulfill a given goal becomes an important and challenging task. To this end, we are interested particularly in dynamic approaches for web service composition. In contrast to the static ones, a composition of services is called dynamic if participant services are selected and composed on the fly based on the needs formulated by the user and the availability of published services. We propose in this work, a flow-graph based system for service composition and composite service discovery to satisfy a functional need of a given query. The idea is to model all the possible connections between published services as Output-Input semantic matching. These established connections are stored in a graph called precedence graph in order to retrieve dynamically, all possible plans that could answer a given query.
{"title":"Graph based approach for dynamic discovery of composite web services","authors":"N. Temglit, M. A. Nacer","doi":"10.1109/ICOS.2012.6417635","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417635","url":null,"abstract":"As more web services can be used over the Internet, the need to find and combine dynamically efficient services to fulfill a given goal becomes an important and challenging task. To this end, we are interested particularly in dynamic approaches for web service composition. In contrast to the static ones, a composition of services is called dynamic if participant services are selected and composed on the fly based on the needs formulated by the user and the availability of published services. We propose in this work, a flow-graph based system for service composition and composite service discovery to satisfy a functional need of a given query. The idea is to model all the possible connections between published services as Output-Input semantic matching. These established connections are stored in a graph called precedence graph in order to retrieve dynamically, all possible plans that could answer a given query.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127404952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}